1. Mozilla Developer Network (MDN Web Docs). Server-side TLS. In the section "Certificates
" it is explained that for a browser to accept a certificate
it must be signed by a trusted root certificate authority that is pre-installed in the browser or operating system. A self-signed certificate does not meet this criterion. (Reference: "Server-side TLS
" Section: Certificates).
2. MIT OpenCourseWare. 6.857 Computer and Network Security
Fall 2014
Lecture 17: Public Key Infrastructure. The lecture notes describe the hierarchical trust model of PKI
where a client validates a certificate by checking the signature of the issuer. For a self-signed certificate
the issuer is the subject itself
which is not a pre-configured trust anchor in the client's browser
thus failing validation. (Reference: 6.857 F14
Lecture 17 Notes
pp. 4-6).
3. Internet Engineering Task Force (IETF). RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Section 6.1
"Basic Path Validation
" specifies the algorithm for verifying a certificate chain. A self-signed certificate cannot form a valid path to a trusted root CA unless it has been explicitly configured as a trust anchor on the local system
which is not the default case. (Reference: RFC 5280
Section 6.1).